tag:blogger.com,1999:blog-88130800355512349362018-03-15T13:41:38.640+05:30StarHackxEthical hacking, Networking tutorials and PC tricks blog.Harjeet Baidwannoreply@blogger.comBlogger212125tag:blogger.com,1999:blog-8813080035551234936.post-22577795499035753202015-08-11T21:31:00.000+05:302017-09-13T15:47:02.666+05:30Kali Linux 2.0 Released
Offensive Security had announced the release date of their Penetration Testing distribution Kali Linux as 11th August 2015. The most awaited version of Kali Linux is dubbed as Kali 2.0 or Kali Sana. Kali Sana has a new Graphical User Interface which looks like the Unity GUI of Canonical's Ubuntu Operating System. New Kali has redesigned the main menu and the tools category and has fast desktopsHarjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com2tag:blogger.com,1999:blog-8813080035551234936.post-80122354799040009662015-03-17T21:45:00.000+05:302015-03-18T08:23:11.357+05:30Top Ten Hackers And Penetration Testers Tools 2015
Aircrack-ng
Aircrack-ng suite contains all that tools that required for
bigginier to highly intense wireless penetration testing. Aircrack-ng tools are
used to test 802.11 WEP/ WPA/ WPA2 PSK passwords strenght. Interesting fact of
Aircrack-ng is that the tool is so famous that it was seen in some movies like Reboot and The
Courier. You can use Aircrack-ng
tools by downloading it from theirHarjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com1tag:blogger.com,1999:blog-8813080035551234936.post-67066074536976872492015-02-25T21:20:00.000+05:302015-12-09T11:14:44.317+05:30Attention Bloggers! Google Banned Adult Explicit Content In Blogspot
Hello all, Latest news for Google bloggers is that Google is now taking strict action against Porn or Adult explicit content posts in Google Blogger. And the strict action is that from March 23, 2015 no blogger can add adult explicit content on Google Blogger. If you want to add adult content on Google Blogger then you have to make your blog to private, if you don't do that, Google will Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-53945095620112080382015-02-24T20:45:00.001+05:302015-02-24T22:07:03.163+05:30New Kali Linux Version 1.1.0 Released
After long time as we expected the newer and better version
of Kali Linux was released on 9 February 2015. Lots of bugs fixed in the new
release and lots of new tools are available in new release of Kali, and some
other changes are also made in new release of Kali. Upgraded version is more
versatile, flexible Linux distribution, rich with more useful security
and penetration testing related Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-55482933941016932432014-10-09T21:47:00.000+05:302014-10-09T21:47:41.142+05:30Download and Run Kali Linux on Android and other Devices
Kali Linux for ARM Processor or we can say it for Android devices is great out by Offensive-Security.com. The new Kali Linux for ARM processors is the hacker best Operating System races in your smart phone, what you want more then this. There is also a list of custom made Kali Linux versions like
Raspberry Pi
Odroid
Cubox
Beaglebones
Chromebooks
and more coming soon but the great thing Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com2Chandigarh, Chandigarh, India30.7333148 76.779417930.5137413 76.4553214 30.952888299999998 77.1035144tag:blogger.com,1999:blog-8813080035551234936.post-48887720609392309892014-09-14T15:28:00.002+05:302014-09-14T15:28:49.532+05:30How To Create Phishing Page In Backtrack SET
Hello friends after a long time I came up with hacking tutorial that is called creating phishing page with the help of Social Engineering toolkit SET available in Backtrack and Kali Linux, preinstalled.While you are creating phishing page manually you have to do a lot of work like editing index.html page. But creating Phishing page by credential harvester in SET is an easy task.
Requirement:Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com1Punjab, India29.968352511676457 75.43464615941047729.968352511676457 75.434646159410477 29.968352511676457 75.434646159410477tag:blogger.com,1999:blog-8813080035551234936.post-39661797443583065602014-09-14T15:27:00.002+05:302014-09-14T15:27:52.815+05:30Setup DNS Poisoning Attack In Local Network
What's up guys You people learn to make Phishing page with SET and to exploit Browser based vulnerabilities earlier. Now the main thing is that, why the victim enter my IP address in his or her browser. Yes you are right we have to make our victim to go to our IP address, and this is only possible with DNS poisoning. So lets start the work to Poisson our victims DNS, so that he or she get Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com1Punjab, India30.684475109450531 76.6473768744617730.24474110945053 75.999183374461765 31.124209109450533 77.295570374461775tag:blogger.com,1999:blog-8813080035551234936.post-59531559150891024822014-02-28T08:40:00.002+05:302014-02-28T08:42:10.781+05:30SNMP ENUMERATION TOOLS TO DOWNLOAD
What is SNMP?
The Simple Network Management Protocol is used to manage and monitor hardware devices connected to a network. To utilise SNMP in this fashion you need three distinct components:
Network Management System
SNMP Agents
Managed devices (SNMP agent deployed)
The managed devices records information and by use of the deployed agent communicates with the overarching Network Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-86541647044437110392014-02-26T16:41:00.000+05:302014-02-26T16:41:48.366+05:30TOP TEN NTP ENUMERATION TOOLS TO DOWNLOAD
Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. It uses UDP port 123. NTP can maintain time to within 10 ms over the public internet. In operation since before 1985, NTP is one of the oldest Internet protocols in use. NTP was originally designed by David L. Mills of the University of Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-6630964313854697492014-02-24T16:45:00.000+05:302014-02-24T16:45:07.312+05:30NETBIOS ENUMERATION TOOLS TO DOWNLOAD
You can use these tools to do the NETBIOS enumeration. To get know the users on your local area network. NetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol. Older operating Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-25906505003960054582014-02-24T16:07:00.000+05:302014-02-24T16:07:32.185+05:30TOP TEN LDAP ENUMERATION TOOLS TO DOWNLOAD
I am going to give you the LDAP Enumeration Tools used in Ethical Hacking by us. The Lightweight Directory Access Protocol is a protocol used to access the directory listings within Active Directory or from other directory services. A directory is in a hierarchical and logical format. I runs on port 389 and tends to confirm to a distinct set of rules Request for comments (RFC's) like other Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-12122269161709537302014-02-23T21:44:00.002+05:302014-02-23T21:46:13.167+05:30LIST OF DORKS TO FIND ADMIN PANELS
List of Dorks to find Admin Pannel of a Website. Copy and paste one of the dork from the list below to Google search engine. When Admin panel opens paste these sql injection string into the Username and password fields and click login.
<!-- starhackx_Postad_custom_size -->
(adsbygoogle = window.adsbygoogle || []).push({});
login.htm
login.html
login/
adm/
admin/
admin/account.html
adminHarjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com1tag:blogger.com,1999:blog-8813080035551234936.post-63961608348156684072014-02-21T10:59:00.001+05:302014-02-21T11:05:09.454+05:30HOW TO TRACE SOME ONE's IP ADDRESS WITH TRACEROUTE
Today I am going to demonstrate that how to trace some one who is annoying you on Internet with simple command (tracert) in Windows Operating Systems. You do not have to go to any where else and to ask others for help, You can trace any computer from your home easily. If Some one from that Ip-Address is annoying you then you can complaint to the upper Ip-address or we can say its ISP about him/Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-81171316770101765262014-02-16T16:00:00.000+05:302014-02-16T16:03:58.740+05:30FULL DETAILS OF IPCONFIG COMMAND IN WINDOWS
Here I am going to give a detail tutorial on IPCONFIG command in Windows XP/7/Vista/8/8.1. So lets start with introduction of IPCONFIG command. The IPCONFIG command in windows is basically used to know the IP-Address of our Network adapter. Their are many Network adapters like ethernet adapter, Wifi adapter, or Bluetooth adpater. The IPCONFIG command works on ethernet and WiFi adpaters and notHarjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-42625212427468930722014-02-09T16:06:00.001+05:302014-06-22T19:30:41.431+05:30HOW TO CUT OTHER USERS INTERNET CONNECTION ON SAME NETWORK.
Hey guys I know you are excited to know how to cut-off some one else internet connection on the same network at school, colleges, or at office. The main advantage of this tool is the downloading speed of your computer will increase when you cut off others internet connection. The main thing is that it is a free tool. I am not going to tell each and every thing about this tool just download the Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com2tag:blogger.com,1999:blog-8813080035551234936.post-68266907988967376682014-02-09T15:24:00.001+05:302014-02-23T20:12:29.523+05:30DOWNLOAD HAVIJ v 1.15 Pro FULLY Cracked [NEW]
Download the full version of Havij v 1.15 pro, no restriction, fully cracked.
<!-- starhackx_Postad_custom_size -->
(adsbygoogle = window.adsbygoogle || []).push({});
Get paid to share your links!
Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com3tag:blogger.com,1999:blog-8813080035551234936.post-84379217943540400262014-02-05T17:57:00.000+05:302014-02-05T17:57:12.335+05:30LIST OF TOP TEN URL SHORTENER
URL -Shortener is the online website used to shorten your long URL. There are number of reasons that why you use the URL shortener . Some of the reasons that I have mentioned may be is the one of your reason to use URL-shortener.
The first is for sure to shorten long urls.
To hide the original url so not to disclose or leak.
To earn money like me with adf.ly and many others.
To send someone a Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-59611305543552711282014-01-25T12:34:00.000+05:302014-02-15T11:01:03.764+05:30COOL GOOGLE DORKS USED FOR HACKING
Hey friends want to learn how to find easy target with Google Dorks for Hacking and to learn how to open live home and office cameras and other hacking with Google Dorks. I Google some time and came up with some cool Google dorks you can use to do Google Hacking. Here I mentioned below some cool Google Dorks to find Live home and office cameras, to find UN-spidered sites on web, to upload your Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-26094204619514497522014-01-18T18:58:00.000+05:302014-02-15T11:03:58.952+05:30LIST of TOP 32 TRAFFIC EXCHANGE WEBSITEs
Hey friends here I give the download link of top 32 traffic exchange websites, on which you can sign-up and increase your website traffic or earn money by surfing. There are two methods that traffic exchanger provides that are automatic and manual. Automatic in the sense, that you just have to open the tab and it will automatically surf without any interruption. And in manual you have too click Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com3tag:blogger.com,1999:blog-8813080035551234936.post-41336029573143588772014-01-10T14:47:00.001+05:302014-02-15T11:03:54.747+05:30UNBLOCK ADF.LY WITHOUT ANY PROXY IN EASY WAY
As we know the ADF.LY is blocked in some countries like India,Phillipens,Poland,Malaysia,UK,USA, Sri Lanka and more. It is a really bad thing for people using ADF.LY for link shortening and earning money through it. No worry guys I am here come up with the latest way to unblock ADF.LY at your home.
<!-- starhackx_Postad_custom_size -->
(adsbygoogle = window.adsbygoogle || []).push({});
Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com2tag:blogger.com,1999:blog-8813080035551234936.post-31343777099137366052014-01-06T16:58:00.006+05:302014-02-15T11:07:39.088+05:30DOWNLOAD Poison IVY RAT [NEW]
<!-- starhackx_Postad_custom_size -->
(adsbygoogle = window.adsbygoogle || []).push({});
Poison IVY RAT Documentation
Get paid to share your links!
Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-29172157642043138172014-01-06T16:58:00.003+05:302014-01-06T16:58:23.186+05:30 DOWNLOAD CyberGate Rayzorex v1.0.0-public [NEW]
Get paid to share your links!
Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-15787630357970552602014-01-06T16:58:00.002+05:302014-01-06T16:58:16.579+05:30 DOWNLOAD CyberGate Solitude v1.6.3 [NEW]
Get paid to share your links!
Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com0tag:blogger.com,1999:blog-8813080035551234936.post-39643909046933280702014-01-06T16:58:00.001+05:302014-02-15T11:10:25.019+05:30DOWNLOAD CyberGate v1.07.5 RAT FOR FREE
<!-- starhackx_Postad_custom_size -->
(adsbygoogle = window.adsbygoogle || []).push({});
Get paid to share your links!
Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com23tag:blogger.com,1999:blog-8813080035551234936.post-72006812488325127942014-01-06T16:57:00.004+05:302014-01-06T16:57:42.569+05:30DOWNLOAD Beast RAT [NEW]
Get paid to share your links!
Harjeet Baidwanhttps://plus.google.com/104428669379815839585noreply@blogger.com1